HK257 Endless Defense!

PS: On June 1st, the monthly pass will be automatically invalidated with five additional contracts.

The newly written anti-virus firewall, under the hands of Shi Lei, who is the pinnacle hacker in the world, supported for half an hour without collapsing, which can already show its excellent performance.

But Shi Lei just ignored a problem, he always wanted to fight against the anti-virus firewall head-on, but he didn't think about another way, directly attacking the anti-virus firewall?

In normal intrusions, many times the antivirus software and firewall are first targeted, first breaking the defense of the firewall, and then piercing the antivirus software to terminate all defenses of the target.

Shi Lei disguised himself as normal access, entered the old laptop from port 80, and did not change other settings, but directly probed the antivirus firewall.

The newly written antivirus firewall, while it protects all the targets that need to be protected, is not able to protect itself!

Shi Lei invaded the inside of the anti-virus firewall, controlled the anti-virus firewall, modified the settings of the anti-virus firewall itself, changed the target that needed to be protected, and unlocked the access restrictions.

The anti-virus firewall that changed the settings did not have any defense, and was directly changed by Shi Lei!

The whole process, no more than three minutes, the originally invincible defense collapsed from itself and became extremely fragile.

Shi Lei frowned, exited from the old notebook, and then opened the source code of the anti-virus firewall and made new modifications.

The newly written anti-virus firewall is not enough for its own defense, so Shi Lei increased the strength in this regard. In addition to this, there is one most important drawback.

That is, you can change the settings of the antivirus firewall directly in your computer!

Is there a way to lock the settings of the anti-virus firewall and prohibit the modification of the settings of the anti-virus firewall on the computer?

It is forbidden to modify the settings of the anti-virus firewall on the computer. So how do you change the settings?

Shi Lei inadvertently caught a glimpse of the high-definition camera on the No. 1 server chassis, and a flash of inspiration flashed in his mind again!

"That's right! How could I be so stupid! Sitting on Baoshan, I don't know how to use it! Shi Lei muttered to himself, and began to modify it in the source code of the anti-virus firewall.

It is forbidden to modify the settings in the computer, but it is not really forbidden to modify the settings in the computer, if it is really done, then what is it called computer software?

The so-called prohibition of modifying settings in the computer is not allowed to pass directly through the computer. Modify settings without authorization. Just like Shi Lei just did, by simulating normal access, after entering the system, he directly modified the protection list and access rules of the anti-virus firewall.

Shi Lei embedded a dynamic behavior capture program in the antivirus firewall. The Motion Capture program is built with a sturdy shell to prevent anyone from hacking.

I want to change the settings of the anti-virus firewall. Must be certified by the Behavioral Motion Capture Program. In other words, Shi Lei needs to use a high-definition camera to complete it in reality, and the settings cannot be directly modified in the computer alone!

After making the behavior dynamic capture program into a solid shell, Shi Lei once again encapsulated the entire anti-virus firewall. It was copied on the old notebook through the U disk for installation and debugging.

It was determined that on the old notebook, the anti-virus firewall was successfully running, and Shi Lei passed through the No. 1 server again. Invasion of old notebooks began.

This time, Shi Lei entered the system through port 80 disguise as the last time, trying to modify the settings of the anti-virus firewall.

Unfortunately, the hard shell made by the behavior motion capture program protects the anti-virus firewall, and if you want to change the settings of the anti-virus firewall, you need to verify the behavior dynamic characteristics!

In other words, not only the action must be compliant, but also the dynamic characteristics of the behavior must also be in line before you can enter the settings page!

Shi Lei and the behavioral dynamic capture program are on the bar, and all kinds of means are exhausted, but these means can't come in through port 80 at all.

Whether it's a virus, a Trojan horse, or a puncture, it doesn't have any effect at all.

Seeing that the anti-virus firewall could not be solved, after testing the invalidation from the outside before, Shi Lei directly dispatched the most powerful means to try.

The last resort is to use a huge amount of data to impact the anti-virus firewall.

Although the anti-virus firewall is powerful, the performance of the machine equipped with it is always limited, and Shi Lei wants to see what will happen to the old notebook after exceeding the limit load of the machine.

Through the No. 1 server, connect to the public server of Shuangqing University, extract the resources of the public server of Shuangqing University, and unite with the No. 1 server to carry out a unified attack on the old notebook!

Shuangqing University's public server, even if it is occupied by the campus security system, far exceeds the performance of the old notebook.

Under the impact of a huge amount of data, the CPU usage of the old notebook increases rapidly, the temperature keeps rising, and when the safety limit is reached, the old notebook crashes directly!

Seeing the result of the crash, Shi Lei had no surprises. The old notebook is restarted, and the anti-virus firewall is automatically and randomly activated, continuing to perform its duties and protect the security of the old notebook.

After passing the brute force test, Shi Lei was very satisfied with the performance of the anti-virus firewall.

What's not to like?

At least Shi Lei can't break through the defense of this anti-virus firewall, no matter what method is used, it will be deleted or rejected by the anti-virus firewall.

As the pinnacle hacker in the world, Shi Lei can't break through the antivirus firewall, can anyone else break through?

Such a person, Shi Lei dares to say that it does not exist!

In other words, such a person, Shi Lei's knowledge of the world's peak level hacker, will definitely not be able to break through!

The newly written anti-virus firewall is an unsolvable defense, even if it is hacked into the system, it cannot prevent the operation of the anti-virus firewall.

Once you touch the defense rules, you will be cleared out directly!

Take the Moon Virus as an example, although the Moon Virus can be browsed normally through the browser, and then enter the system in the form of cached temporary files, when it wants to form a resident disk virus, or when it wants to infect the picture files of other protected files, it will be deleted by the anti-virus firewall!

For this newly written anti-virus firewall, Shi Lei is full of absolute confidence.

Compared with the rock firewall, the newly written antivirus software is many times more powerful!

Shi Lei named the newly written anti-virus firewall - Endless Defense!

Meaning, there is no end to the defense of this antivirus software, only endless defense!

After determining the availability of Endless Defense, Shi Lei immediately encrypted the source code of Endless Defense with a behavioral motion capture program and stored it separately in a USB flash drive.

On Server 1, the Rock Firewall has stepped back into the background to provide the latest defense support with the new Endless Defense.

Seeing that Endless Defense was installed on the No. 1 server, Shi Lei yawned, stood up and locked the No. 1 server, at this moment it was already dark outside the window, Shi Lei washed up a little, and then lay on the bed and fell asleep.

I stayed up all night, and I couldn't afford to hurt!

In the country of Vausan, in the Internet, Raphael laid many traps, waited for Mr. M to appear, waited all night, and didn't even see Mr. M's ghost!

Raphael, who had worked in vain, decided to wait a little longer.

Raphael was on the other side of the world, and the time over there was exactly the opposite of the time here, and an all-nighter in the country of Vausan, the Southern Dynasty and the Xia was just a day on Raphael's side.

A day is nothing to Raphael, Raphael is ready to wait for another all-nighter, according to Raphael's idea, the Xia Kingdom, the Vosan Kingdom and the Southern Dynasty Kingdom are daytime, maybe Mr. M likes to act during the day?

The second-generation moon virus broke out at around nine o'clock in the daytime of the country of Wosan!

Time passed in a hurry, and it was close to five o'clock in the afternoon, and Shi Lei, who had stayed up all night, finally got up in a daze. On the other side of the world, where Raphael was, it was already close to five o'clock in the morning.

Raphael, who was waiting for a rage, couldn't help it, and controlled his supercomputer Ray to easily attack the official website of NHK TV, leaving an inexplicable announcement.

'Mr. M, you damned despicable thief, now solemnly warn you to return to me what you have stolen quickly. Otherwise, no matter the ends of the earth, I will find you and break you into pieces! ’

There is no sign-off, and there is no sign, Raphael doesn't want to cause trouble in Vausan, after all, the International Intelligence Agency of the Ministry of Foreign Affairs is not simple, and Raphael will also feel annoyed if he is targeted by them.

NHK TV is out of luck!

NHK TV has been repeatedly injured many times, and every time a hacker incursions, I can't forget the official website of NHK TV.

This time, Raphael also subconsciously used the official website of NHK TV, maybe he also felt that the official website of NHK TV was better to invade!

When Shi Lei finished washing, unlocked the behavior motion capture program of the No. 1 server, and checked the situation of the moon virus in Wasang Country, he checked the news of TBS TV by the way.

From the news of TBS TV, Shi Lei found the information that the official website of NHK TV was hacked again, and also found Raphael's message.

From Raphael's message, Shi Lei judged in an instant that it was Raphael!

Shi Lei once snatched the fruits of Raphael's victory in Sumida District, Tokyo, and thus had a grudge with Raphael. Fortunately, the Mr. M vest that was used at the beginning, otherwise it would not be a good thing to be remembered by the Angel Council!

It's just that after the successful development of Endless Defense, as long as there is a supercomputer Yan in hand, Shi Lei doesn't seem to be very afraid of the Angel Council!

Endless Defense, unlike the Rock Firewall, has few characteristics. There will only be two moves, delete and deny access. In other words, without corresponding characteristics, there is no fear of exposure!

Even if the International Intelligence Bureau of the Ministry of Foreign Affairs besieges Shi Lei again, Shi Lei can calmly use endless defense to resist the International Intelligence Bureau of the Ministry of Foreign Affairs.

As long as you run a server with Endless Defense, the performance is good enough to withstand any attack!

"Raphael, do you want to have fun? Then let's have fun! ”.

(To be continued.) )